A.28 Appendix A: Unix Security Checklist
You're doing just what you should be doing!